From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-11.7 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,INCLUDES_CR_TRAILER,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 672F7C07E95 for ; Tue, 13 Jul 2021 10:22:16 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id F17716120A for ; Tue, 13 Jul 2021 10:22:15 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org F17716120A Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=kernel.org Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=owner-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix) id 121E36B008C; Tue, 13 Jul 2021 06:22:16 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 0AB546B0095; Tue, 13 Jul 2021 06:22:16 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id E66386B0096; Tue, 13 Jul 2021 06:22:15 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0228.hostedemail.com [216.40.44.228]) by kanga.kvack.org (Postfix) with ESMTP id BA8106B008C for ; Tue, 13 Jul 2021 06:22:15 -0400 (EDT) Received: from smtpin26.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay04.hostedemail.com (Postfix) with ESMTP id CB60F289E0 for ; Tue, 13 Jul 2021 10:22:14 +0000 (UTC) X-FDA: 78357174588.26.3DA204B Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by imf08.hostedemail.com (Postfix) with ESMTP id 7A23130000A9 for ; Tue, 13 Jul 2021 10:22:14 +0000 (UTC) Received: by mail.kernel.org (Postfix) with ESMTPSA id A92FE611CB; Tue, 13 Jul 2021 10:22:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1626171733; bh=S4DYoR9vB4H4k1IjW6dUgtFP/bjqo4vpc0Qfg9yYKco=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=cFZNjRNL1kq3sX7/5bp5TZPoTN+tD1OvV04aki0pPrHpKKlOIv+oAfGTOfqZ0Fppa blAz6lnKF3FhfMbT+dSfeh9x0jCTkEvChlJfrvhNLa9oJQrGrFlfSnZ9NrHOIVYdRD q1PfMdb01UIZ0ZncIBns8zkRluEKBiRQYALj/fIDddDdvXbd2XAKw6fJoUJucEIcxO 6xVMqsWHr643fRL8rXMVhbuYlF3LFoujvTp6ADa2LaY4s02C5jd+K06VeExaWv68RE nJ7S8IhQuzmQ7K0nvAp94YZRbtmT7lPkd+ym1ui8tEDgRsHNhE4qjFgDT+Ser2n80L KYfyyZVq1wdow== Date: Tue, 13 Jul 2021 13:22:07 +0300 From: Mike Rapoport To: David Hildenbrand Cc: Andrew Morton , Greg Kroah-Hartman , Mike Rapoport , "Rafael J. Wysocki" , linux-kernel@vger.kernel.org, linux-mm@kvack.org Subject: Re: [PATCH 1/2] mm: remove pfn_valid_within() and CONFIG_HOLES_IN_ZONE Message-ID: References: <20210713080035.7464-1-rppt@kernel.org> <20210713080035.7464-2-rppt@kernel.org> <7300dfe1-0c6a-ae2e-2c48-c885248ec263@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <7300dfe1-0c6a-ae2e-2c48-c885248ec263@redhat.com> X-Rspamd-Server: rspam04 X-Rspamd-Queue-Id: 7A23130000A9 X-Stat-Signature: cr4igso8fddnxnedhrgnc9wya9ixbecm Authentication-Results: imf08.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=cFZNjRNL; dmarc=pass (policy=none) header.from=kernel.org; spf=pass (imf08.hostedemail.com: domain of rppt@kernel.org designates 198.145.29.99 as permitted sender) smtp.mailfrom=rppt@kernel.org X-HE-Tag: 1626171734-262459 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On Tue, Jul 13, 2021 at 11:51:46AM +0200, David Hildenbrand wrote: > On 13.07.21 10:00, Mike Rapoport wrote: > > From: Mike Rapoport > > > > After recent changes in freeing of the unused parts of the memory map and > > rework of pfn_valid() in arm and arm64 there are no architectures that can > > have holes in the memory map within a pageblock and so nothing can enable > > CONFIG_HOLES_IN_ZONE which guards non trivial implementation of > > pfn_valid_within(). > > > > With that, pfn_valid_within() is always hardwired to 1 and can be > > completely removed. > > > > Remove calls to pfn_valid_within() and CONFIG_HOLES_IN_ZONE. > > > > Signed-off-by: Mike Rapoport > > There is currently the discussion to increase MAX_ORDER, for example, to > cover 1GiB instead of 4MiB on x86-64. This would mean that we could > suddenly, again, have holes insides MAX_ORDER - 1 pages. > > So I assume if we ever go down that path, we'll need something like this > again. It depends whether pageblock_order will be also increased. PFN walkers rely on continuity of pageblocks rather than MAX_ORDER chunks, so if pageblock_order won't change, there won't be need to check for pfn_valid() inside a pageblock. > For now, this looks like the right thing to do > > Acked-by: David Hildenbrand Thanks! -- Sincerely yours, Mike.